<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="billres.xsl"?>
<!DOCTYPE bill PUBLIC "-//US Congress//DTDs/bill.dtd//EN" "bill.dtd">
<bill bill-stage="Introduced-in-House" dms-id="H3B3011CFFCBF4ABD86F7F585BE81BF9C" public-private="public" key="H" bill-type="olc"><metadata xmlns:dc="http://purl.org/dc/elements/1.1/">
<dublinCore>
<dc:title>106 HR 6429 IH: Shielding Children's Retinas from Egregious Exposure on the Net Act</dc:title>
<dc:publisher>U.S. House of Representatives</dc:publisher>
<dc:date>2023-11-15</dc:date>
<dc:format>text/xml</dc:format>
<dc:language>EN</dc:language>
<dc:rights>Pursuant to Title 17 Section 105 of the United States Code, this file is not subject to copyright protection and is in the public domain.</dc:rights>
</dublinCore>
</metadata>
<form>
<distribution-code display="yes">I</distribution-code><congress display="yes">118th CONGRESS</congress><session display="yes">1st Session</session><legis-num display="yes">H. R. 6429</legis-num><current-chamber>IN THE HOUSE OF REPRESENTATIVES</current-chamber><action display="yes"><action-date date="20231115">November 15, 2023</action-date><action-desc><sponsor name-id="M001211">Mrs. Miller of Illinois</sponsor> (for herself and <cosponsor name-id="L000578">Mr. LaMalfa</cosponsor>) introduced the following bill; which was referred to the <committee-name committee-id="HIF00">Committee on Energy and Commerce</committee-name></action-desc></action><legis-type>A BILL</legis-type><official-title display="yes">To require certain interactive computer services to adopt and operate technology verification measures to ensure that users of the platform are not minors, and for other purposes.</official-title></form><legis-body id="HA7311B0B5BA0467394AA681F8A342E94" style="OLC"><section section-type="section-one" id="H05CFE84B583842E191D777DED54E8ECE"><enum>1.</enum><header>Short title</header><text display-inline="no-display-inline">This Act may be cited as the <quote><short-title>Shielding Children's Retinas from Egregious Exposure on the Net Act</short-title></quote> or the <quote><short-title>SCREEN Act</short-title></quote>.</text></section><section commented="no" id="H2D6422A38B2B45E3A7A5B99CFE9500A2"><enum>2.</enum><header>Findings; sense of Congress</header><subsection commented="no" id="HC8C4DE7D0383474B9E845EDEEAD18A08"><enum>(a)</enum><header>Findings</header><text>Congress finds the following:</text><paragraph id="HE3D1FB6876E8494DADA9D9CBA4436DE9"><enum>(1)</enum><text>Over the 3 decades preceding the date of enactment of this Act, Congress has passed several bills to protect minors from access to online pornographic content, including title V of the Telecommunications Act of 1996 (<external-xref legal-doc="public-law" parsable-cite="pl/104/104">Public Law 104–104</external-xref>) (commonly known as the <quote>Communications Decency Act</quote>), section 231 of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/231">47 U.S.C. 231</external-xref>) (commonly known as the <quote>Child Online Protection Act</quote>), and the Children’s Internet Protection Act (title XVII of division B of <external-xref legal-doc="public-law" parsable-cite="pl/106/554">Public Law 106–554</external-xref>). </text></paragraph><paragraph id="H6AC4E5F914CB49909A57877C5DC3F091"><enum>(2)</enum><text>With the exception of the Children's Internet Protection Act (title XVII of division B of <external-xref legal-doc="public-law" parsable-cite="pl/106/554">Public Law 106–554</external-xref>), the Supreme Court of the United States has struck down the previous efforts of Congress to shield children from pornographic content, finding that such legislation constituted a <quote>compelling government interest</quote> but that it was not the least restrictive means to achieve such interest. In Ashcroft v. ACLU, 542 U.S. 656 (2004), the Court even suggested at the time that <quote>blocking and filtering software</quote> could conceivably be a <quote>primary alternative</quote> to the requirements passed by Congress.</text></paragraph><paragraph id="H12BC8EC55E3A43B3A600F9506A4EA7F8"><enum>(3)</enum><text>In the nearly 2 decades since the Supreme Court of the United States suggested the use of <quote>blocking and filtering software</quote>, such technology has proven to be ineffective in protecting minors from accessing online pornographic content. The Kaiser Family Foundation has found that filters do not work on 1 in 10 pornography sites accessed intentionally and 1 in 3 pornography sites that are accessed unintentionally. Further, it has been proven that children are able to bypass <quote>blocking and filtering</quote> software by employing strategic searches or measures to bypass the software completely.</text></paragraph><paragraph id="H8ABA6027C98F4C5ABA80B6B646FEF4F0"><enum>(4)</enum><text>Additionally, Pew Research has revealed studies showing that only 39 percent of parents use blocking or filtering software for their minor’s online activities, meaning that 61 percent of children only have restrictions on their internet access when they are at school or at a library.</text></paragraph><paragraph id="H15F45D6F713645F28C048B112DCF848E"><enum>(5)</enum><text>17 States have now recognized pornography as a public health hazard that leads to a broad range of individual harms, societal harms, and public health impacts.</text></paragraph><paragraph id="H9CA1C1F97EC141BA957F9885B12CB0C8"><enum>(6)</enum><text>It is estimated that 80 percent of minors between the ages of 12 to 17 have been exposed to pornography, with 54 percent of teenagers seeking it out. The internet is the most common source for minors to access pornography with pornographic websites receiving more web traffic in the United States than Twitter, Netflix, Pinterest, and LinkedIn combined.</text></paragraph><paragraph id="HB6015EB3C2D04D708F1ABABAFCAF2E54"><enum>(7)</enum><text>Exposure to online pornography has created unique psychological effects for minors, including anxiety, addiction, low self-esteem, body image disorders, an increase in problematic sexual activity at younger ages, and an increased desire among minors to engage in risky sexual behavior.</text></paragraph><paragraph id="H90AD8ECA44074F949A04654AD5FBE345"><enum>(8)</enum><text>The Supreme Court of the United States has recognized on multiple occasions that Congress has a <quote>compelling government interest</quote> to protect the physical and psychological well-being of minors, which includes shielding them from <quote>indecent</quote> content that may not necessarily be considered <quote>obscene</quote> by adult standards.</text></paragraph><paragraph id="H9653C0EC76A84B2094E414148590321D"><enum>(9)</enum><text>Because <quote>blocking and filtering software</quote> has not produced the results envisioned nearly 2 decades ago, it is necessary for Congress to pursue alternative policies to enable the protection of the physical and psychological well-being of minors.</text></paragraph><paragraph id="H8CFAE7C6111F47EE9FE44C5F2350F338"><enum>(10)</enum><text>The evolution of our technology has now enabled the use of age verification technology that is cost efficient, not unduly burdensome, and can be operated narrowly in a manner that ensures only adults have access to a website’s online pornographic content.</text></paragraph></subsection><subsection id="HE882C6AC62FA40E9B61905F534C79F6A"><enum>(b)</enum><header>Sense of Congress</header><text>It is the sense of Congress that—</text><paragraph id="H7E8ED8C6B883464B95357BD10DA92D2D"><enum>(1)</enum><text>shielding minors from access to online pornographic content is a compelling government interest that protects the physical and psychological well-being of minors; and</text></paragraph><paragraph id="H9D75DBA9EC5E418A9983C5C01213BB54"><enum>(2)</enum><text>requiring interactive computer services that are in the business of creating, hosting, or making available pornographic content to enact technological measures that shield minors from accessing pornographic content on their platforms is the least restrictive means for Congress to achieve its compelling government interest.</text></paragraph></subsection></section><section id="H3AE451E7E024489380AB097BF936A0DA"><enum>3.</enum><header>Definitions</header><text display-inline="no-display-inline">In this Act:</text><paragraph id="H425CD3E512124C10B56DAE1F5FB69E59"><enum>(1)</enum><header>Child pornography; minor</header><text>The terms <term>child pornography</term> and <term>minor</term> have the meanings given those terms in section 2256 of title 18, United States Code.</text></paragraph><paragraph id="H58E6BFF98AD3472A80352B73C9D51AE5"><enum>(2)</enum><header>Commission</header><text>The term <term>Commission</term> means the Federal Trade Commission.</text></paragraph><paragraph id="H942575AE66124CA9B6A60452C6066B78"><enum>(3)</enum><header>Covered platform</header><text>The term <term>covered platform</term>—</text><subparagraph id="H8B0FE1BB2FF54059A0D266B58E5DF1BF"><enum>(A)</enum><text>means an entity—</text><clause id="H3C4B047AA5ED4EA19A24318189BEE4CE"><enum>(i)</enum><text>that is an interactive computer service;</text></clause><clause id="H8B6AEC659A3F44E9952D1BD3BB376843"><enum>(ii)</enum><text>that—</text><subclause id="HFFB15E7125CA40DF8A17B03A051F7025"><enum>(I)</enum><text>is engaged in interstate or foreign commerce; or</text></subclause><subclause id="H08610005C277483DA8ACDA98ADE0FAAB"><enum>(II)</enum><text>purposefully avails itself of the United States market or a portion thereof; and</text></subclause></clause><clause id="H8EAA03D40F154379BE7A4A61F55B6774"><enum>(iii)</enum><text>for which it is in the regular course of the trade or business of the entity to create, host, or make available content that meets the definition of harmful to minors under paragraph (4) and that is provided by the entity, a user, or other information content provider, with the objective of earning a profit; and </text></clause></subparagraph><subparagraph id="HFC2A6F3D2E284BD6A894C99A03457C56"><enum>(B)</enum><text>includes an entity described in subparagraph (A) regardless of whether—</text><clause id="H184D1666717C4CE686F939CFF0483183"><enum>(i)</enum><text>the entity earns a profit on the activities described in subparagraph (A)(iii); or</text></clause><clause id="HEB619889DCAB4621B964AA8BAF0E665B"><enum>(ii)</enum><text>creating, hosting, or making available content that meets the definition of harmful to minors under paragraph (4) is the sole source of income or principal business of the entity. </text></clause></subparagraph></paragraph><paragraph id="H1A84C64D234044BD8EC90567CD3AE9A8"><enum>(4)</enum><header>Harmful to minors</header><text>The term <term>harmful to minors</term>, with respect to a picture, image, graphic image file, film, videotape, or other visual depiction, means that the picture, image, graphic image file, film, videotape, or other depiction—</text><subparagraph id="H5BD252B5829247B2AFA8A7FFFA9CB756"><enum>(A)</enum><clause commented="no" display-inline="yes-display-inline" id="H1042ED6F269C41509DBCF80E2E62297D"><enum>(i)</enum><text>taken as a whole and with respect to minors, appeals to the prurient interest in nudity, sex, or excretion;</text></clause><clause indent="up1" id="H95230E8BDB92420E94BDB9A070483078"><enum>(ii)</enum><text>depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or lewd exhibition of the genitals; and</text></clause><clause indent="up1" id="HC1F87F7F07C242CA876DC047E23220E1"><enum>(iii)</enum><text>taken as a whole, lacks serious, literary, artistic, political, or scientific value as to minors;</text></clause></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HA3833BE438D7418F9BB47BA706A2369B"><enum>(B)</enum><text>is obscene; or</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H4BC7297638724849B4DBA3EC0084CE7C"><enum>(C)</enum><text>is child pornography.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H115605CBC1EA4B27907543F3C956DB1B"><enum>(5)</enum><header>Information content provider; interactive computer service</header><text>The terms <term>information content provider</term> and <term>interactive computer service</term> have the meanings given those terms in section 230(f) of the Communications Act of 1934 (<external-xref legal-doc="usc" parsable-cite="usc/47/230">47 U.S.C. 230(f)</external-xref>).</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H20C63936B304433B8D3D9759749B0BF7"><enum>(6)</enum><header>Sexual act; sexual contact</header><text>The terms <term>sexual act</term> and <term>sexual contact</term> have the meanings given those terms in section 2246 of title 18, United States Code.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H6932747DEF0343B7A8DB0B553E42FBB8"><enum>(7)</enum><header>Technology verification measure</header><text>The term <term>technology verification measure</term> means technology that—</text><subparagraph commented="no" display-inline="no-display-inline" id="HFB809810A71B4FAFA9DD256D329910D5"><enum>(A)</enum><text>employs a system or process to determine whether it is more likely than not that a user of a covered platform is a minor; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H3993FE96F480428B84D22956BC918D68"><enum>(B)</enum><text>prevents access by minors to any content on a covered platform.</text></subparagraph></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HD37BC2054C9F43409A54E39EAB5DF795"><enum>(8)</enum><header>Technology verification measure data</header><text display-inline="yes-display-inline">The term <term>technology verification measure data</term> means information that—</text><subparagraph commented="no" display-inline="no-display-inline" id="HF6CAEC3DFA6247DE920C9065C4D8EF26"><enum>(A)</enum><text>identifies, is linked to, or is reasonably linkable to an individual or a device that identifies, is linked to, or is reasonably linkable to an individual;</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HE68CCAD5FCE74D1A90E26882E69CC1BA"><enum>(B)</enum><text display-inline="yes-display-inline">is collected or processed for the purpose of fulfilling a request by an individual to access any content on a covered platform; and</text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="H6FC74244109440ED8AEFFC0A08FDD2A8"><enum>(C)</enum><text>is collected and processed solely for the purpose of utilizing a technology verification measure and meeting the obligations imposed under this Act.</text></subparagraph></paragraph></section><section id="H45878082C0174C328F08EE504F50A5F7"><enum>4.</enum><header>Technology verification measures</header><subsection id="HDDE8F37E6DAF42A59C1A6D26AD0B6AC3"><enum>(a)</enum><header>Covered platform requirements</header><text>Beginning on the date that is 1 year after the date of enactment of this Act, a covered platform shall adopt and utilize technology verification measures on the platform to ensure that—</text><paragraph id="HF767AB224A3C4996A3C226AB896FACEB"><enum>(1)</enum><text>users of the covered platform are not minors; and</text></paragraph><paragraph id="H37A9E6D1087948409F49B2B50373EECB"><enum>(2)</enum><text>minors are prevented from accessing any content on the covered platform that is harmful to minors.</text></paragraph></subsection><subsection id="H048B33AF14064BA499CA4D7A6FE4B7F0"><enum>(b)</enum><header>Requirements for age verification measures</header><text>In order to comply with the requirement of subsection (a), the technology verification measures adopted and utilized by a covered platform shall do the following:</text><paragraph id="H19BD9A244DF247E192FABDF9770DE87B"><enum>(1)</enum><text>Use a technology verification measure in order to verify a user's age. </text></paragraph><paragraph id="H5F1C16FFC96747B58878656CE266AB65"><enum>(2)</enum><text>Provide that requiring a user to confirm that the user is not a minor shall not be sufficient to satisfy the requirement of subsection (a). </text></paragraph><paragraph id="H3E5080D97BFB47969B77044B045B02C4"><enum>(3)</enum><text>Make publicly available the verification process that the covered platform is employing to comply with the requirements under this Act.</text></paragraph><paragraph id="HDBAF2AE867AD40D5A41E0426764258D3"><enum>(4)</enum><text>Subject the Internet Protocol (IP) addresses, including known virtual proxy network IP addresses, of all users of a covered platform to the technology verification measure described in paragraph (1) unless the covered platform determines based on available technology that a user is not located within the United States.</text></paragraph></subsection><subsection id="HEBCDAFADB9744C0F9197A2948AD26126"><enum>(c)</enum><header>Choice of verification measures</header><text>A covered platform may choose the specific technology verification measures to employ for purposes of complying with subsection (a), provided that the technology verification measure employed by the covered platform meets the requirements of subsection (b) and prohibits a minor from accessing the platform or any information on the platform that is obscene, child pornography, or harmful to minors.</text></subsection><subsection id="HDEA87AD80F2A45E4AAAAA3DB93A0DED3"><enum>(d)</enum><header>Use of third parties</header><text>A covered platform may contract with a third party to employ technology verification measures for purposes of complying with subsection (a) but the use of such a third party shall not relieve the covered platform of its obligations under this Act or from liability under this Act.</text></subsection><subsection id="H4B83D3FE23204C45A6C56A13DE3113F6"><enum>(e)</enum><header>Rule of construction</header><text>Nothing in this section shall be construed to require a covered platform to submit to the Commission any information that identifies, is linked to, or is reasonably linkable to a user of the covered platform or a device that identifies, is linked to, or is reasonably linkable to a user of the covered platform.</text></subsection><subsection commented="no" display-inline="no-display-inline" id="H582F625E19F344D2B10D7AC5FE2DA6FA"><enum>(f)</enum><header>Technology verification measure data security</header><text>A covered platform shall—</text><paragraph id="HD2E6323B8D82418EB11D205622AADE06"><enum>(1)</enum><text>establish, implement, and maintain reasonable data security to—</text><subparagraph commented="no" display-inline="no-display-inline" id="H0975FA59FC534249BC071AACA042CFEA"><enum>(A)</enum><text display-inline="yes-display-inline">protect the confidentiality, integrity, and accessibility of technology verification measure data collected by the covered platform or a third party employed by the covered platform; and </text></subparagraph><subparagraph commented="no" display-inline="no-display-inline" id="HEFD17600074B43DFACA2B3D0C4092535"><enum>(B)</enum><text display-inline="yes-display-inline">protect such technology verification measure data against unauthorized access; and</text></subparagraph></paragraph><paragraph id="H87FE4B7591F44C568A897509A9127A35"><enum>(2)</enum><text>retain the technology verification measure data for no longer than is reasonably necessary to utilize a technology verification measure or what is minimally necessary to demonstrate compliance with the obligations under this Act. </text></paragraph></subsection></section><section id="HADCB8EA9A8BF4542A3E3D3EFE680238F"><enum>5.</enum><header>Consultation requirements</header><text display-inline="no-display-inline">In enforcing the requirements under section 4, the Commission shall consult with the following individuals, including with respect to the applicable standards and metrics for making a determination on whether a user of a covered platform is not a minor:</text><paragraph id="H6F6650E3F12843A3973F13292E154627"><enum>(1)</enum><text>Individuals with experience in computer science and software engineering.</text></paragraph><paragraph id="H48389BCED76E4D6BBBF383620371EE68"><enum>(2)</enum><text>Individuals with experience in—</text><subparagraph id="HDBFD6597CB304E569E4472F309CE304D"><enum>(A)</enum><text>advocating for online child safety; or</text></subparagraph><subparagraph id="H1A3CF39F2ECD418BAA15479C0BB03E85"><enum>(B)</enum><text>providing services to minors who have been victimized by online child exploitation.</text></subparagraph></paragraph><paragraph id="HB1E9298DFC4040CCBF0BBEAFFF3DA0F6"><enum>(3)</enum><text>Individuals with experience in consumer protection and online privacy.</text></paragraph><paragraph id="H1872895F9FD44302AB4BAA4F79C9D36D"><enum>(4)</enum><text>Individuals who supply technology verification measure products or have expertise in technology verification measure solutions.</text></paragraph><paragraph id="HB3C771E9BF65406392AE7F1233EDED60"><enum>(5)</enum><text>Individuals with experience in data security and cryptography.</text></paragraph></section><section commented="no" display-inline="no-display-inline" id="H86769F2BD9364326B354C42461A2D2C0"><enum>6.</enum><header>Commission requirements</header><subsection commented="no" display-inline="no-display-inline" id="HF19C067A597747189113AA1D43133273"><enum>(a)</enum><header display-inline="yes-display-inline">In general</header><text display-inline="yes-display-inline">The Commission shall—</text><paragraph id="HB316D647DA6340FEBAA35C73BB74782B"><enum>(1)</enum><text>conduct regular audits of covered platforms to ensure compliance with the requirements of section 4;</text></paragraph><paragraph id="HD531F3B9DBB44CC8BA5D88213205BF86"><enum>(2)</enum><text>make public the terms and processes for the audits conducted under paragraph (1), including the processes for any third party conducting an audit on behalf of the Commission;</text></paragraph><paragraph id="HFC5FA407296E4BE79EE22507E9DEB2ED"><enum>(3)</enum><text>establish a process for each covered platform to submit only such documents or other materials as are necessary for the Commission to ensure full compliance with the requirements of section 4 when conducting audits under this section; and</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="HABAA21635D2D4613AFFDBD067C325BAB"><enum>(4)</enum><text>prescribe the appropriate documents, materials, or other measures required to demonstrate full compliance with the requirements of section 4.</text></paragraph></subsection><subsection commented="no" display-inline="no-display-inline" id="H9D2B5B3506BA4256A2065051FD21B9A5"><enum>(b)</enum><header>Guidance</header><paragraph commented="no" display-inline="no-display-inline" id="H7E8897471AEC4722A4A7BD06873EAD8D"><enum>(1)</enum><header display-inline="yes-display-inline">In general</header><text>Not later than 180 days after the date of enactment of this Act, the Commission shall issue guidance to assist covered platforms in complying with the requirements of section 4.</text></paragraph><paragraph commented="no" display-inline="no-display-inline" id="H26E985B0988D41E5A97C9480FB44D6CC"><enum>(2)</enum><header>Limitations on guidance</header><text>No guidance issued by the Commission with respect to this Act shall confer any rights on any person, State, or locality, nor shall operate to bind the Commission or any person to the approach recommended in such guidance. In any enforcement action brought pursuant to this Act, the Commission shall allege a specific violation of a provision of this Act. The Commission may not base an enforcement action on, or execute a consent order based on, practices that are alleged to be inconsistent with any such guidelines, unless the practices allegedly violate a provision of this Act. </text></paragraph></subsection></section><section id="HCBF5F4262ED94F789636614AEB78409A"><enum>7.</enum><header>Enforcement</header><subsection commented="no" display-inline="no-display-inline" id="HA7D32A80FA724103B2AF07658CC25BC2"><enum>(a)</enum><header display-inline="yes-display-inline">Unfair or deceptive act or practice</header><text display-inline="yes-display-inline">A violation of section 4 shall be treated as a violation of a rule defining an unfair or deceptive act or practice under section 18(a)(1)(B) of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/57a">15 U.S.C. 57a(a)(1)(B)</external-xref>).</text></subsection><subsection commented="no" display-inline="no-display-inline" id="H01BD09F621D44542A765ACA2624EC418"><enum>(b)</enum><header>Powers of the Commission</header><paragraph id="HEFCFE49D8D1D44BE87EE29D043E4BDE3"><enum>(1)</enum><header>In general</header><text>The Commission shall enforce section 4 in the same manner, by the same means, and with the same jurisdiction, powers, and duties as though all applicable terms and provisions of the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>) were incorporated into and made a part of this title.</text></paragraph><paragraph id="H8A38B41350AB4E599A685F88E9A63553"><enum>(2)</enum><header>Privileges and immunities</header><text>Any person who violates section 4 shall be subject to the penalties and entitled to the privileges and immunities provided in the Federal Trade Commission Act (<external-xref legal-doc="usc" parsable-cite="usc/15/41">15 U.S.C. 41 et seq.</external-xref>).</text></paragraph><paragraph id="H076555C75BED4FF8BD1C09D502E27641"><enum>(3)</enum><header>Authority preserved</header><text>Nothing in this Act shall be construed to limit the authority of the Commission under any other provision of law. </text></paragraph></subsection></section><section id="H3FF55B63F1134AFD906BA2F7A3E912E6"><enum>8.</enum><header>GAO report</header><text display-inline="no-display-inline">Not later than 2 years after the date on which covered platforms are required to comply with the requirement of section 4(a), the Comptroller General of the United States shall submit to Congress a report that includes—</text><paragraph id="H9DCB5B0510DC499DB85704AF8BDF5BE0"><enum>(1)</enum><text>an analysis of the effectiveness of the technology verification measures required under such section;</text></paragraph><paragraph id="HA1477FB9C0224BA0BA9DF92165920EDE"><enum>(2)</enum><text>an analysis of rates of compliance with such section among covered platforms;</text></paragraph><paragraph id="H21FCC3A8C16C4B328B7FD7793D27AA4F"><enum>(3)</enum><text>an analysis of the data security measures used by covered platforms in the age verification process;</text></paragraph><paragraph id="H4BADB609BE8A4D47930B74F2CF27516D"><enum>(4)</enum><text>an analysis of the behavioral, economic, psychological, and societal effects of implementing technology verification measures; </text></paragraph><paragraph id="H14193B482E5445BFA090E08A4C229504"><enum>(5)</enum><text>recommendations to the Commission on improving enforcement of section 4(a), if any; and</text></paragraph><paragraph id="H0FA4132E7B954EF2802A5BA413BF58A2"><enum>(6)</enum><text>recommendations to Congress on potential legislative improvements to this Act, if any. </text></paragraph></section><section id="HD8591E94ACF64C8DA6CF156B3CC887A3"><enum>9.</enum><header>Severability clause</header><text display-inline="no-display-inline">If any provision of this Act, or the application of such a provision to any person or circumstance, is held to be unconstitutional, the remaining provisions of this Act, and the application of such provisions to any other person or circumstance, shall not be affected thereby. </text></section></legis-body></bill> 

